Background: During acrylic resin processing, the mold must be separated from the surface of the gypsum to prevent liquid resin from penetrating into the gypsum, and water from the gypsum seeping into the acrylic resin. For many years, tin foil was the most acceptable separating medium, and because it's difficult to apply, a tin-foil substitute is used. In this study, olive oil is used as an alternative to tin foil separating medium for first time, and evaluating its effect as a separating medium on some mechanical properties such as (indentation hardness and transverse strength) of acrylic resins denture base comparing it with those processed using tin-foil and tin foil substitute such as (cold mold seal) separating medium. Materials and Methods: One hundred Twenty four acrylic resins samples (124) were prepared falling in two main groups: (heat and cold-cured acrylic denture base resins), for each group three types of separating medium were used and five tests (10 samples) for each test were carried out, and (4) samples for the chemical composition. Results: Tin foil is one of the most satisfactory separating media in getting the best properties when using it as a separating medium, while, a statistically no-significant difference have been noticed between olive oil and cold-mold seal samples concerning mechanical properties of tested groups. Infrared spectroscopy analysis showed that, no changes were found in the chemical composition of both heat and cold-cured acrylic resins denture base after using olive oil as a separating medium. Conclusion:The present study concluded that olive oil may be used as a substitute for tin foil and cold – mold seal separating medium in processing both heat and cold – cure acrylic resin denture base.
In the present study, metal complexes of Mn(II), Ni(II), Co(II), Cu(II) and Hg(II) were synthesized using new Tetraazamacrocyclic Schiff Base (5E,8E,14E,17E)-6,8,15,17-tetramethyl-1,2,3,4,4a,7,9a,10,11,12,13,13a,16,18a-tetradecahydrodibenzo [b,i][1,4,8,11]tetraazacyclotetradecine (L) derived from 1,2-diamino cyclo hexane with the acetyl acetone. Compounds have been exanimated and confirmed by fourier-transform infrared (FT-IR), ultraviolet-visible (UV-visible), proton nuclear magnetic resonance (1HNMR), carbon nuclear magnetic resonance (13CNMR), microelemental analyses (CHN), thermal analysis (TG), conductivity and magnetic susceptibility. The propose geometry for all complexes [MLCl2] structures were octahedral. Therm
... Show MoreThis research aims to learn about public relations programs and their role to enhance the morale of the State land Transport Company employees.The researcher relied on the survey method and use a questionnaire and scale tools to collect information from workers in the Department of Relations and Media and employees in all departments.
The research reached several conclusions, including:
1- Public relations seek to increase workers’ confidence in senior management and motivate them to improve their production, as well as their relentless endeavor to bring workers closer by following multiple and varied forms of communication with them.
2- The results of the study showed that there was a negative i
Nanostructured Al2O3has been applied as a protective coating against corrosion of the carbon steel (C.S) in seawater environment (3.5% NaCl) at temperatures range (298-328)K. Aluminananoparticles were deposited on carbon steel substrates by cathodic electrophoretic deposition (EPD) with ethanol as suspension medium and poly(acrylic acid) (PAA) as polymeric charging agent. Meanwhile, thesurface morphology was examined using Atomic-force microscopy (AFM). The cross-section AFM showed that the particles sizes for the Al2O3 NPs is around 60-80 nm. The anticorrosion behaviour of coated C.S was investigated in 3.5% NaCl at temperature range 298-328 K by potentiodynamic polarization measurements. Results show that using PAA in suspension coat incr
... Show MoreTrue random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules
Background: The main objective was to compare the outcome of single layer interrupted extra-mucosal sutures with that of double layer suturing in the closure of colostomies.
Subjects and Methods: Sixty-seven patients with closure colostomy were assigned in a prospective randomized fashion into either single layer extra-mucosal anastomosis (Group A) or double layer anastomosis (Group B). Primary outcome measures included mean time taken for anastomosis, immediate postoperative complications, and mean duration of hospital stay. Secondary outcome measures assessed the postoperative return of bowel function, and the overall mean cost. Chi-square test and student t-test did the statistical analysis..
Resu
... Show MoreViolence occurs as a daily human action all over the world; it may cause so many kinds of damage to individuals as well as to society: physical, psychological, or both. Many literary authors of different genres have tried their best to portray violence by showing its negative effects, especially playwrights because they have the chance to show people the dangers of violence through performance on stage to warn them against such negatively affected action. It has been a human action since the beginning of human life on this planet when the first crime happened on earth when Cane killed his brother Abel. In our modern world, people are witnessing daily violent actions as a result of destructive wars that turned the humans into brutal beings.
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreThe study explores the use of ergative verbs in constructing clauses and their impact on the backgrounding of the agent's role in two selected short stories. Contrary to hypothesis No. 1, the research indicates that changes in sentence patterns don't affect the meaning of the process. Additionally, hypothesis No. 2 is refuted as the middle structure is found to highlight the agent's role in the science fiction short story, Terra Infirmum, rather than concealing it as hypothesized for "The Invisible Man." The analysis uncovers that writers utilize ergative processes to narrate stories in various ways, including transitive/active voice, intransitive/active voice, and transitive/passive voice. Furthermore, the findings suggest that writers emp
... Show More